Advanced Threats,Intelligence Technology,CyberSecurity
84.6K views | +8 today
Follow
 
Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

 #Mandiant Exposes #APT1 – One of #China's #Cyber #Espionage Units & Releases 3,000 Indicators 

 #Mandiant Exposes #APT1 – One of #China's #Cyber #Espionage Units & Releases 3,000 Indicators  | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Today, The Mandiant® Intelligence Center™ released an unprecedented report exposing APT1's multi-year, enterprise-scale computer espionage campaign. APT1 is one of dozens of threat groups Mandiant tracks around the world and we consider it to be one of the most prolific in terms of the sheer quantity of information it has stolen.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac

A Single-Character Message Can Crash Any Apple iPhone, iPad Or Mac | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Single-Character Telugu Message Can Crash Any Apple Mac and iOS Device
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
It's just the latest reported vulnerability for the secure messaging application.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

CyberEdge Cyberthreat Defense Report Infographic

CyberEdge Cyberthreat Defense Report Infographic | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
CyberEdge's comprehensive study and infographic of 1,100 security professionals' perceptions of the industry - fourth annual survey
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Here’s how hostile states are hiding behind ‘independent’ hackers

Here’s how hostile states are hiding behind ‘independent’ hackers | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
"Proxy” hackers allow states to exercise great power without great responsibility.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Abusing X.509 Digital Certificates to establish a covert data exchange channel

Abusing X.509 Digital Certificates to establish a covert data exchange channel | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Researcher at Fidelis Cybersecurity devised a new technique that abuses X.509 Digital Certificates to establish a covert data exchange channel
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero users

Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero users | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
The image of a memo leaked online suggests US Army and NSA are able to unmask Tor, I2P, VPNs users and they are working to track Monero,
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How can banks fight cybercrime? - Information Age

How can banks fight cybercrime? - Information Age | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Banks can effectively fight cybercrime by placing confidence in new forms of technology including AI and machine learning
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Lateral Movement with PowerPoint and DCOM – attactics[dot]org

Lateral Movement with PowerPoint and DCOM – attactics[dot]org | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Universal XSS via Evernote WebClipper

Universal XSS via Evernote WebClipper | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
During an evening of bug hunting, I found a cool issue in Evernote's WebClipper tool. The result was a UXSS vulnerability, which we explore in this post.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

On the Origin of Ransomware Species | Citrix Blogs

On the Origin of Ransomware Species | Citrix Blogs | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
In this blog post, I'm going to take a look at the evolution of ransomware – a still relatively new, but already deadly species.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

#DCShadow  explained :A technical deep dive into the latest #AD #attack #technique 

#DCShadow  explained :A technical deep dive into the latest #AD #attack #technique  | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
During the latest BlueHatIL security conference, the new “DCShadow” attack against AD has been released. This article makes a technical analysis of the attack.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

First ‘Jackpotting’ Attacks Hit U.S. ATMs — Krebs on Security

First ‘Jackpotting’ Attacks Hit U.S. ATMs — Krebs on Security | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Attackers Abused Indian Bank's SWIFT System to Try to Steal $2M

Attackers Abused Indian Bank's SWIFT System to Try to Steal $2M | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Digital attackers abused the SWIFT system of an Indian bank in an attempt to make off with approximately $2 million in stolen funds.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining

CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners.
Constantin Ionel Milos / Milos Constantin's insight:
Share your insight
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Inside North Korea’s Hacker Army - Bloomberg

Inside North Korea’s Hacker Army - Bloomberg | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
The regime in Pyongyang has sent hundreds of programmers to other countries. Their mission: Make money by any means necessary. Here's what their lives are like.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

CVE-2018-4878: An Analysis of the Flash Player Hack

CVE-2018-4878: An Analysis of the Flash Player Hack | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Detailed analysis of attack exploiting Flash Player vulnerability CVE-2018-4878
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Cisco's Talos Intelligence Group Blog: Targeted Attacks In The Middle East

Cisco's Talos Intelligence Group Blog: Targeted Attacks In The Middle East | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Will China Weaponize Social Media? by Kent Harrington

Will China Weaponize Social Media? by Kent Harrington | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Now that Russia has shown how cyber tactics and informational subterfuge can upend established democracies, China will surely be taking some pages from the Kremlin's playbook. Chinese President Xi Jinping has made it clear that maintaining domestic stability and burnishing China's image abroad is the name of the government's game.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Massive Smominru Cryptocurrency Botnet Rakes In Millions

Massive Smominru Cryptocurrency Botnet Rakes In Millions | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Researchers say Smominru threat actors are in control of 500,000 node botnet and earning $8,500 daily mining for Monero cryptocurrency.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Why are we all silent on the surveillance?

Why are we all silent on the surveillance? | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Silicon Valley with its bright minds has come to a point where almost every day they collect information about individuals. Why are we all silent on the surveillance?
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Korea In The Crosshairs

Korea In The Crosshairs | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Lotus Blossom Continues ASEAN Targeting | RSA Link

Lotus Blossom Continues ASEAN Targeting | RSA Link | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
During the last weeks of January (2018), nation state actors from Lotus Blossom conducted a targeted malspam campaign against the Association of
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

New Windows patch disables Intel’s bad Spectre microcode fix

New Windows patch disables Intel’s bad Spectre microcode fix | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
Registry keys can also be used to selectively enable or disable the microcode fix.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

BLOCKBUSTED: Lazarus, Blockbuster, and North Korea - Intezer

BLOCKBUSTED: Lazarus, Blockbuster, and North Korea - Intezer | Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it
As we have proven in previous research blog posts, malware authors often reuse the same code. This evolution of code and code reuse is seen all throughout the well known Blockbuster campaign and connections between other malware attributed to the Lazarus group, a cyber threat organization attributed to North Korea. You can read about excellent …
more...
No comment yet.